Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2019:4154 - Security Advisory
Issued:
2019-12-10
Updated:
2019-12-10

RHSA-2019:4154 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel-alt security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-alt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-alt packages provide the Linux kernel version 4.x.

Security Fix(es):

  • Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)
  • kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203)
  • kernel: use-after-free Read in vhost_transport_send_pkt (CVE-2018-14625)
  • kernel: Information leak in cdrom_ioctl_drive_status (CVE-2018-16658)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • IPMI use after free issue seen on Marvell ThunderX2 (BZ#1732163)
  • kernel: siginfo delivers SEGV_MAPERR instead of SEGV_ACCERR [rhel-alt-7.6.z] (BZ#1757189)

Enhancement(s):

  • [Marvell 7.7 z-stream BUG] CN99xx: DIMM label not extracted in EDAC hw error log (BZ#1721427)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for ARM 64 7 aarch64
  • Red Hat Enterprise Linux for Power 9 7 ppc64le
  • Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x

Fixes

  • BZ - 1550811 - CVE-2017-18203 kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service
  • BZ - 1619846 - CVE-2018-14625 kernel: use-after-free Read in vhost_transport_send_pkt
  • BZ - 1627731 - CVE-2018-16658 kernel: Information leak in cdrom_ioctl_drive_status
  • BZ - 1746708 - CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer

CVEs

  • CVE-2017-18203
  • CVE-2018-14625
  • CVE-2018-16658
  • CVE-2019-14821

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for ARM 64 7

SRPM
kernel-alt-4.14.0-115.16.1.el7a.src.rpm SHA-256: 85ad3433b5ff82f8e1fa12ebbdd8f97de677d3481de2e219a44ff7899f6eb51d
aarch64
kernel-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 51d15f88263a7df88c4b157f646e9ef541d42372fbf570bafbc572e42e2c2dee
kernel-abi-whitelists-4.14.0-115.16.1.el7a.noarch.rpm SHA-256: 60394366f9d0bc039d697fa95ef8207435246ad4822135495cbefa00b29f2d3a
kernel-debug-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: c5c283264247a35c187cb45372f8b6c3852ca2e848b154284d62f6c9948117de
kernel-debug-debuginfo-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 1accd4b2e2b6f646dc1b1c0873d9c2b39dac78870e40f6bc95d85fabd115a05c
kernel-debug-debuginfo-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 1accd4b2e2b6f646dc1b1c0873d9c2b39dac78870e40f6bc95d85fabd115a05c
kernel-debug-devel-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 3d2a59ede924fc14641c8fa019a41f4c4ddb5faf59b0000cac6ed67fe23b27c8
kernel-debuginfo-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: d73040881903944b553e81331f1a6baf734fa0b54aa8dd611b935b61d97997e3
kernel-debuginfo-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: d73040881903944b553e81331f1a6baf734fa0b54aa8dd611b935b61d97997e3
kernel-debuginfo-common-aarch64-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: ba0178adecbb8852513b15cbc568faffe61e855e0f72aa9d305f3c34a3948fb4
kernel-debuginfo-common-aarch64-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: ba0178adecbb8852513b15cbc568faffe61e855e0f72aa9d305f3c34a3948fb4
kernel-devel-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: b0f0f43f9e73f17632b23224e0a8e3a019b6d61f141402a6a4c0e28d1d56fbe4
kernel-doc-4.14.0-115.16.1.el7a.noarch.rpm SHA-256: bdbfd267bc2a77485fbb93074723cc2a8b3d4290ce86682219b96f03f23a9308
kernel-doc-4.14.0-115.16.1.el7a.noarch.rpm SHA-256: bdbfd267bc2a77485fbb93074723cc2a8b3d4290ce86682219b96f03f23a9308
kernel-headers-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 542a560bf4b5b47b72508aeb578ae0ed64092795677c6c22ebbb63bd93c94911
kernel-tools-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 84175bd9eb2677e9070edcd3db0a72b694a0d5d34d2f0db92b67635978afe4bb
kernel-tools-debuginfo-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 0179a8aef78ac00b505086f6b44541ea69caa3cb40a29429d78aba69e778f93c
kernel-tools-debuginfo-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 0179a8aef78ac00b505086f6b44541ea69caa3cb40a29429d78aba69e778f93c
kernel-tools-libs-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 0c159e9199f66425e6c189be22d1f29e018a72cc487dcbf26fd03e6a3b125803
kernel-tools-libs-devel-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 2a3edba1dc025e3eec8e0a4ef97db2175de7021fcf4842e169ef3034dc3d838e
perf-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 30990db938750e0b6758d3cc5aa9ce2879adafe317fe9b88a725f28f9d7e3e72
perf-debuginfo-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: faa4075ee35b936f85fcb8d58d64ff81f59777ea3de4416b03d1160499a9ed31
perf-debuginfo-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: faa4075ee35b936f85fcb8d58d64ff81f59777ea3de4416b03d1160499a9ed31
python-perf-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: be7136acbb68a07710da877bd4dff5ea713a0a872b210d472160552a7295900d
python-perf-debuginfo-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 645f91cafb6be401aa0da3da887fe962d485457e02e7001f76ba64eb156aa6aa
python-perf-debuginfo-4.14.0-115.16.1.el7a.aarch64.rpm SHA-256: 645f91cafb6be401aa0da3da887fe962d485457e02e7001f76ba64eb156aa6aa

Red Hat Enterprise Linux for Power 9 7

SRPM
kernel-alt-4.14.0-115.16.1.el7a.src.rpm SHA-256: 85ad3433b5ff82f8e1fa12ebbdd8f97de677d3481de2e219a44ff7899f6eb51d
ppc64le
kernel-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: f67fcf2279b8a9912c89c996e3ce49a29c4083679ca80fbefd01d687aecabbd2
kernel-abi-whitelists-4.14.0-115.16.1.el7a.noarch.rpm SHA-256: 60394366f9d0bc039d697fa95ef8207435246ad4822135495cbefa00b29f2d3a
kernel-bootwrapper-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: a2d675df629afbbbf5987873cdb9571c94ed2548f3b7f9c0bfd52cca4ae12d1e
kernel-debug-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: a2baee59863b5582e7762c6c48cc9ea6173d4f3144660025e6451f53c8bcb449
kernel-debug-debuginfo-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 6b87f9fc10a244d29517cfeee60713ed77cf934342c2b5094970066089c5874a
kernel-debug-debuginfo-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 6b87f9fc10a244d29517cfeee60713ed77cf934342c2b5094970066089c5874a
kernel-debug-devel-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: e46c4a842da3b24acd9048f98c5f6b6153a20b1a305d3279f49b38983290f3f2
kernel-debuginfo-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 85f3907d2c18e2b3645a8ab1fa904547fd8bd309a5324988c5d8b710647cc658
kernel-debuginfo-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 85f3907d2c18e2b3645a8ab1fa904547fd8bd309a5324988c5d8b710647cc658
kernel-debuginfo-common-ppc64le-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 9a4b2b82481fd31e63a4503a78a453e99721ff584555ca36fea1e84bf1abda30
kernel-debuginfo-common-ppc64le-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 9a4b2b82481fd31e63a4503a78a453e99721ff584555ca36fea1e84bf1abda30
kernel-devel-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 13195f7fd39dbca90908600a0a64ffe53a643ca029cc27c0753d2cf6979dafd2
kernel-doc-4.14.0-115.16.1.el7a.noarch.rpm SHA-256: bdbfd267bc2a77485fbb93074723cc2a8b3d4290ce86682219b96f03f23a9308
kernel-headers-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: a67eac26309999f6326f1f1a32589e20d94227d2f38cd1d915b8e74ecdb4c374
kernel-tools-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: af10a249e04e68ad86c7e2c660628c7f30f82b1edcb6614c3d5d2aad72ffe445
kernel-tools-debuginfo-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 26659d8868bcc40604a10de2b866df555f5b17a74eff10bcad9f3f8a3cf3edc0
kernel-tools-debuginfo-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 26659d8868bcc40604a10de2b866df555f5b17a74eff10bcad9f3f8a3cf3edc0
kernel-tools-libs-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 6fc91e0271fa8a90b4427345ee380b111b623975db02a33a12ed6e273f85e032
kernel-tools-libs-devel-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: b96f60b4f9d6ac1a1316bf4621254ea2753b85e20599d73d001b279860adc32f
perf-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 790ac86797e3c588702eb473d93f43e0613f54946e6e47e3604afad7a10c5615
perf-debuginfo-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 294243900dfe6465d77ec2c9bc09b662b2a0bf98cd8699705a33f411e7732299
perf-debuginfo-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 294243900dfe6465d77ec2c9bc09b662b2a0bf98cd8699705a33f411e7732299
python-perf-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: ea32ec00061933dcb68e46841585018edcbe9dcbed7df9f5aeed43346bb3ef03
python-perf-debuginfo-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 200a959746331b56c6afa3f045c60267f18f3f8166b377cecde560e3e00a7b9a
python-perf-debuginfo-4.14.0-115.16.1.el7a.ppc64le.rpm SHA-256: 200a959746331b56c6afa3f045c60267f18f3f8166b377cecde560e3e00a7b9a

Red Hat Enterprise Linux for IBM System z (Structure A) 7

SRPM
kernel-alt-4.14.0-115.16.1.el7a.src.rpm SHA-256: 85ad3433b5ff82f8e1fa12ebbdd8f97de677d3481de2e219a44ff7899f6eb51d
s390x
kernel-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 6297deb71ea0323e5f5add0eb5a72d208a5865a1d3d6d5fd49eed243a487a564
kernel-abi-whitelists-4.14.0-115.16.1.el7a.noarch.rpm SHA-256: 60394366f9d0bc039d697fa95ef8207435246ad4822135495cbefa00b29f2d3a
kernel-debug-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 713105e19541d2bf548cb05bd502af23ce38a37c4aef16664b8c360f42ce53d1
kernel-debug-debuginfo-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 495a311fc71a0e85e6abe726ac67bbbcb89b20ea88ba4bcb0d0b958b4f129280
kernel-debug-devel-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 76104dcf0863d7de83bd41a52df58e8bbe4195fd34a092e8791001705aa36a13
kernel-debuginfo-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 9c083eccbe68df9a0b4831da33d8c390f6c7e13c207420fb41b884d655ab4305
kernel-debuginfo-common-s390x-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 74c7a93d710abccdfa428b2dd98c0e01415ce2d8c245557927f092016ba3bc15
kernel-devel-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 5ec73a1b90bffbdfeb62960a0a03ddcada3bf0d3c8a1d2132ea6883b9379e716
kernel-doc-4.14.0-115.16.1.el7a.noarch.rpm SHA-256: bdbfd267bc2a77485fbb93074723cc2a8b3d4290ce86682219b96f03f23a9308
kernel-headers-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: def8b899f30e10494672c5e37c759cf1653deff92b61389549596de7e6e5c758
kernel-kdump-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: a2e891d1c559b9abc34b4d40d1a4ebda3ec71d4833dd96ccda8928ba37a8129c
kernel-kdump-debuginfo-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: c6a3c660f6ef29cc21662fbd67ba794e8943036c73271c8442b9b38099f09148
kernel-kdump-devel-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 1231914163c4b22d4fb5cca37f7f1e8689e158fe3be742e893b75f6844307c67
perf-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 1883e23e62e9a086dc9a41658a80a6fda44322ef7c6704b0d7f796cd22943b93
perf-debuginfo-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 1cfde80d8be583b7a778c731842e2f2c50af51855e9df9be8d288d0a98bca086
python-perf-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: 81976e7ed8c48803cb227829b66b0ad3032b6ddc65e735a23364e46a8802dfbc
python-perf-debuginfo-4.14.0-115.16.1.el7a.s390x.rpm SHA-256: f5eeadee137eda92e40b62a19c297eafe88824dbadb8808f1b7f1a39308b31b8

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility